SALS: Semantics-Aware Location Sharing Based on Cloaking Zone in Mobile Social Networks

Size: px
Start display at page:

Download "SALS: Semantics-Aware Location Sharing Based on Cloaking Zone in Mobile Social Networks"

Transcription

1 SALS: Semantics-Aware Location Sharing Based on Cloaking Zone in Mobile Social Networks Yanzhe Che College of Computer Science and Technology Zhejiang University, Hangzhou PR China, Kevin Chiew School of Engineering Tan Tao University Duc Hoa District Long An Province, Vietnam Qinming He College of Computer Science and Technology Zhejiang University, Hangzhou PR China, Xiaoyan Hong Department of Computer Science University of Alabama Tuscaloosa, AL 35487, USA ABSTRACT There is a potential privacy breach when users access various location-based social applications on a mobile social network (MSN), e.g., sharing locations with friends. To preserve location privacy, one of the most common methods is to use a coarse or fake location instead of a user s exact location. However, most of these previous approaches only provide geometric strategies without considering the semantic context of the geographical locations. For example, if a cloaked region contains a part of a lake, where no boats are allowed, an adversary can easily prune the cloaked region to a smaller range covering a user s actual location. In this paper, we propose SALS, a semantics-aware location sharing framework based on cloaking zone for an MSN environment. By considering a user s social relations and activities which are available in an MSN environment, SALS does not assume any trustworthy entities, including strangers, friends or any third parties. As a solution, SALS enables users to cooperate with each other, in a Peer-to- Peer (P2P) way, to generate the cloaking zones, which will be used instead of the actual locations. Different from the previous cloaking techniques, SALS considers the semantic location which can influence the distribution probability of a user s locations. We also propose metrics for measuring the quality of the cloaking zone. The evaluation shows that our method can well defend the semantic-location attack. Categories and Subject Descriptors K.4 [Computers and Society]: Public Policy Issues Privacy; C.2.0 [Computer-Communication Networks]: Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ACM SIGSPATIAL MobiGIS 12, November 6, Redondo Beach, CA, USA Copyright (c) 2012 ACM ISBN /12/11...$ General Security and protection; H.2.8 [Information system]: Database Applications Spatial databases and GIS General Terms Security, Management Keywords Mobile social network, Location privacy, Semantic location, Cloaking zone 1. INTRODUCTION The rapid evolution of the mobile devices has enabled the conventional web-based social network, such as Facebook, with ubiquitous accessibility and location-based feature which are turning it mobile. On the other hand, native mobile social networks (MSNs), such as Foursquare, are created dedicated to mobile users which can establish mobile virtual communities to bring individuals with similar interests together via their smartphones or tablets. As a result, both of the two trends have motivated the great popularity of MSNs nowadays. Embedded with location-based features, MSNs are capable of providing diverse location-based social applications, e.g., check in 1, personal life sharing 2, location-based social games 3, as well as some traditional location-based services (LBS) like restaurant recommendations. While using these applications, mobile users need to report their locations to the MSN servers timely or to share locations with their social friends or some strangers. However, the widespread use of location information also raises a great concern for preserving location privacy. On one hand, some advanced location-determining techniques, e.g., GPS and RFID, can precisely determine one s position both indoor and outdoor with an accuracy of about 10 meters which has made it easier for an adversary to disclose one s private information. For example, by inferring from 1 Provided by Foursquare at 2 Provided by Path at 3 Shadow Cities at 49

2 a user s whereabouts, an adversary can precisely determine the user s home address. On the other hand, a user s location data, if combined with his profile and social information which are available on an MSN, may cause even more serious threats. For example, if a mobile user, whose identity is available on an MSN, is found to visit a cancer hospital by his insurance agent, he may have to pay more on his medical insurance in the next year. In order to address such problems, some of the previous work proposed solutions of both pseudonyms and dummy location sharing [1, 2, 13]. Other research [8, 12, 15] designed policies to control the sharing process as well as the usage of these location information. We also have many existing spatial cloaking techniques to solve this problem [3,5,6,9,10,14], which will hide users inside a coarse area to achieve the k- anonymity protection. A common drawback for all of the above solutions is that they all assume some trustworthy entities in their frameworks, e.g., a third party server or some neighbor mobile users. However, in an MSN environment, none of these entities can be fully trusted, e.g., the location server which stores users actual locations, a third party server which manages the dummy-id pool for users or the social friends on MSN who may accidentally misuse the users shared locations. Another serious problem is, although there already exist solutions that can defend various attacks, e.g., social-relation-disclosure attack [2], and solutions which provide different geometric strategies to achieve good k-anonymity protection, however most of them do not consider the background knowledge of the geographical context, i.e., the semantic location. A semantic location is a geographical place with real-life context, e.g., a supermarket or a lake, which can affect the distribution probability of users locations. If an adversary has such knowledge, he can prune a user s coarse location into a precise bound and thus defeat these privacy-preserving solutions. Our research takes full account of the different types of privacy attacks in an MSN environment and proposes a framework of exhaustive location privacy preserving for mobile users, namely SALS. In SALS, we do not trust any entities in an MSN environment, thus every user never reports the exact location but uses a customized cloaking zone (CZ) instead. The CZ covers the user himself as well as some anonymities and achieves the k-anonymity protection. While generating a CZ, SALS enables mobile users to work together, in a P2P way, to make the CZ flexible enough to cover more anonymities inside. Moreover, SALS also considers the semantic location affection and hence adjusts the shape and area of the CZ in order to avoid covering some unreachable places. For example, to cover a lake as one part of the CZ is meaningless because few mobile users appear on the lake generally. In brief, the major contributions of our work are summarized as below. We propose a privacy preserving framework SALS for an MSN environment without assuming any trustworthy entities. We summarize two main categories of privacy attacks and describe the main idea for each attack. When generating a CZ, we take into account the semantic locations affection. We also specify the metrics for measuring the quality of a CZ and propose MaxDen algorithm for generating a CZ. Experimental results show that our MaxDen algorithm has a good performance to defend the semantic-location attack. The remaining sections are organized as follows. After reviewing the related work in Section 2, we analyze the potential threats and summarize the privacy attacks in an MSN environment in Section 3, and propose our research problem and the SALS architecture in Section 4, followed by presenting the design of SALS framework in Section 5. We give the implementation of MaxDen algorithm for generating CZ in Section 6 with experiments to evaluate the performance against privacy attacks in Section 7 before concluding the paper in Section RELATED WORK For a broad range of techniques proposed for preserving user locations privacy, we categorize them into three main classes, i.e., pseudonyms and dummy location technique, privacy policies technique, and spatial cloaking technique. As a representative of the pseudonyms and dummy location technique, mix-zone [1] enables users to change their pseudonyms inside a special region where users do not report locations. However, it is not suitable for an MSN because an MSN server has to maintain the right social relation for each user, making the pseudonyms useless. On the other hand, some work [2, 13] enables users to report dummy locations to location servers. However, it brings with both extra computing and communicating overheads to generate, transmit and process these dummy locations. Some privacy-policies solutions design several policies, e.g., strict access control rules and location usage strategies, to protect users privacy when sharing the location information [8, 12, 15]. The IETF geopriv working group 4 also provided several protocols and frameworks for the enforcement of location privacy policies. Many solutions employ spatial cloaking technique for location privacy preserving in which users are hidden inside a cloaking region to achieve the k-anonymity protection which means a user can hide inside k 1 anonymities from which an attacker cannot distinguish him/her. Some of them are built on a trust third party architecture [9, 10, 14], whilst some other of them use a P2P way [3, 5, 6]. All of these solutions rely on some trust relationships, either the third parties or other mobile P2P users. However in an MSN environment, these entities, including the MSN servers as well as a user s social relationships, are not always trustworthy. Moreover, most of these solutions do not consider the semantic location affection. In this paper, our solution follows this category of technique and tries to solve the trust problem with the consideration of semantic location affection. 3. THREATS AND ATTACK MODELS In this section, we present the main location privacy threats and then describe different types of attacks that an adversary can use to violate a user s location privacy. 3.1 Potential Threats Based on the unique characteristic of an MSN environment, we analyze the potential threats for mobile users. 4 Geopriv 50

3 Threat 1. The mobile users cannot be trusted. One of the most important characteristics of an MSN is that we cannot trust a mobile user only based on his online identity. This is because there are some malicious attackers who secretly collecte a victim s location information or actively attack the victim. Such an attacker can use a pseudonyms/fake online identity to pretend to be a normal user or can compromise some of the victim s friends mobile devices. As a result, we conclude that the mobile users, no matter strangers or friends, should never be fully trusted for privacy concern. Threat 2. The MSN servers or other third parties cannot be trusted. The fact is that the MSN servers and other third parties, who provide location-based social applications, have already record a list of historical location information of each user. By utilizing various types of data mining techniques, they can disclose users interests and habits, or trace their trajectories. It is not surprising to see that they trade the users valuable personal information for commercial purpose or with political motivation. Moreover, the MSN servers could be compromised by an adversary, leading to further disclosure of the sensitive information for malicious purpose. 3.2 Attack Models in an MSN Environment This section summarizes the attack models in an MSN environment where an adversary can collect data from the MSN applications to violate a user s location privacy. In this paper, we classify all the attacks into two main categories, namely passive attacks and active attacks. For the passive attacks, an adversary passively collects mobile users location information and estimates a user s location by (1) utilizing the flaw of the user s location generating algorithm; (2) utilizing some background knowledge of the geographical context, i.e., semantic locations; or (3) utilizing the social relationship information of the user. A group of attacks for this category are given as follows. In the semantic-location attack, based on the knowledge of the geographical location around a victim, an adversary can take advantage of the semantic location affection to prune the victim s coarse location into a precise bound [7]. For example, the victim creates a cloaking region which covers a shopping mall inside. However, a malicious attacker, who is familiar with this area, knows that the shopping mall is closed at this time so that he can prune the cloaked region to estimate the victim s real location. Due to different strategies of cloaked region generating algorithms, a victim may have a higher probability to be located around the center or the boundary of the cloaked region. Therefore, a center-of-zone attack or a border-ofzone attack can be used to guess the victim s exact location in the given region. In an MSN environment, where users social relationship is available, an adversary can also initiate a social-relationdisclosure attack in which a victim s real location may be disclosed by his online friends. For example, when visiting a cancer hospital, Alice stops sharing location information for privacy concern. However, her accompanying friend Bob is still sharing locations. Therefore, an adversary who is aware of the friendship can also disclose Alice s activity illegitimately. For the active attacks, an adversary not only collects but also actively sends malicious messages to a victim in order to disturb his normal privacy-preserving process. In the regionprobing attack, an adversary may send several fake locations, P2P Network Mobile Users Base Station WiFi Internet MSN Server MSN Server MSN Server Figure 1: The system architecture of SALS which are purposely created, to the victim. Suppose that the victim has adjusted his cloaked region in order to cover these fake locations, then the adversary can estimate the victim s location based on the change of the cloaked region. In the location-flooding attack, which is similar to the Denial-of-Service (DoS) attack, a victim will receive flooding dummy locations, which are sent by an attacker or forwarded by some innocent users, so that the mobile device cannot work normally. We also introduce the visual-aid attack in which an adversary can observe the locality directly or via some security cameras. For example, a user has reported many fake locations around him. However the cameras show that the user is the only person inside that locality and then an attacker can identify him. Furthermore, the adversary may also compromise the MSN servers or mobile devices directly. However, due to the page limitation, we leave addressing these active attacks to future work. 4. SYSTEM MODEL AND PROBLEM STATE- MENT In this section, we present our research problem and then describe the system architecture of SALS. 4.1 Research Problem Given all these threats and attacks leading to privacy violation, the research problem of this paper is to design an efficient and effective framework to enable users to cooperate together to generate customized cloaking zones which are used for location sharing instead of their actual locations. Note that the framework should also satisfy the following requirements. (1) A user does not have to trust any entities in an MSN environment. (2) The generated CZ should try to cover more anonymous users inside to achieve better k- anonymity protection. (3) The generated CZ should also consider semantic location affection. 4.2 System Architecture Different from some of the former work such as MobiShare [13], we do not deploy a location server to store users location information. Instead, the SALS architecture is similar to the conventional client-server architecture which is simple and easy to implement. Figure 1 shows the details of the architecture. It only consists of two types of entities, namely mobile users and MSN Servers, and two types of networks, i.e., the mobile P2P network among mobile users and the transmission network between users and servers. In SALS, every mobile user periodically shares his unique CZ with others via the P2P communication. Based on the received CZs from neighbors and the knowledge of semantic locations, each user can then ameliorate his CZ for better 51

4 Figure 2: The representation of semantic location based on grid map: (a) semantic location feature identification; (b) semantic location coefficient values at daytime; (c) semantic location coefficient values at night privacy protection. When accessing location-based social applications, these CZs will be used instead of users actual locations. Mobile users carry mobile devices, e.g., smartphones and tablets, which have positioning functionality, e.g., GPS, to allow them accurately determine their geographical positions. Mobile users can access the Internet via the Wi- Fi access points or base stations. The Mobile P2P network is a highly ad-hoc network which allows mobile users to communicate with each other via wireless transmission protocols, e.g., Bluetooth or IEEE , or ad hoc network routing protocols, e.g., LANMAR [11]. This network is self-organized and does not rely on any servers or fixed communication infrastructure. In SALS, mobile users can share their CZs with each other by utilizing this network. MSN Servers are providing various location-based social applications. These servers manage both the users personal profiles and their social relationships. In this paper, we assume that these servers are equipped with privacypreserving query processing engines [4] which can process the location-based queries based on coarse locations. The Transmission network is responsible for transmitting messages between the mobile users and MSNs. These messages can be either in plain text or in cipher text which is determined by the service agreements. 5. DESIGN OF SALS In this section, we firstly describe the semantic location affection and then point out the metrics for evaluating the quality of a CZ. We transform the real-world map into a discrete gridbased space which contains m n grids with equal area. We refer to this discrete grid-based space as GridMap henceforth. Each mobile user is placed into one and only one grid, identified by a row-column pair (x, y). Since users do not trust any entities, we enable them to use a cloaking zone to share with other users or servers, so as to achieve the k- anonymity protection. The definition of CZ is shown below. Definition 1. The cloaking zone, denotes as CZ, is a rectangle region and can be defined as a 4-tuple record CZ = (id, t, g ul, g br ) where id indicates the unique ID of a mobile user, t is the generation time of the zone, and g ul and g br represent the upper-left and bottom-right grids of the zone which can be identified by using the coordinates (x ul, y ul ) and (x br, y br ) in a 2D Euclidean space respectively. As an example of the semantic location affection, as shown in Figure 2(a), the GridMap has five semantic types, namely road, park, lake, market and residence, which represent the semantic features of the locations in the real world respectively. For each grid in the GridMap, we assume that it is small and flexible enough to be assigned to only one semantic feature. For example, the 3 4 grids on the upper-left corner of GridMap are all of semantic feature Market. In practice, a mobile user can assign each type of semantic feature with a coefficient, denoted as C(location), which can roughly measure the likelihood that other users may appear in that semantic location. As shown in Figure 2(b), we have C(lake) with a relatively small value 0.2 because few people with mobile devices can appear on a lake except for those on boats. We also notice that C(market) > C(lake) since the probability for a user to be located in a market is much greater than on a lake. Moreover, a mobile user can also adjust these coefficients based on some factors, e.g., time and weather. For example, Figure 2(b) shows the coefficient values in daytime whilst Figure 2(c) shows these values at night. So we have C(park) = 0.5 at daytime and C(park) = 0.1 at night, because the background knowledge shows that the park is closed at night. As aforementioned, the semanticlocation attack can estimate the victim s real location if he does not consider the semantic location affection when generating the CZ. Deducing from the definition of k-anonymity, we conclude that the more anonymous users a CZ covers, the better quality of protection it can provide. Given the semantic location affection, it is wise for a CZ to carefully choose some grids to cover based on the probability that users will appear in that grid. Hence, when user Alice receives a shared CZ from user Bob, Alice can analyze the probability that Bob may be located in each grid inside the CZ. From the other side, it is also the probability that an attacker, when receiving a CZ, can get about this user at a particular grid g. Thus, we define this probability value for each grid as follows. Definition 2. Given a CZ z, and a grid g inside z, i.e., g z, the probability for the user who generates z to be located at g, denote as p(g, z), can be calculated by C(g) p(g, z) = C(g ) where C(g) is the semantic location coefficient of g. By the definition, if all the grids covered by a CZ are of the same semantic type, i.e., C(g) are all the same, we can 52

5 Figure 3: An example of semantic location affection: (a) the show of semantic location coefficient values; (b) the show of the probability value p(g,z). conclude that a user s position follows uniform distribution over these grids and the values of p(g, z) all equal to 1/N where N is the number of grids inside the CZ. Otherwise, the user s position distribution is nonuniform. For the example in Figure 3, the values of semantic location coefficients are shown in Figure 3(a) from which we know that the lake is unreachable for users but the market is crowded by users. Hence, as shown in Figure 3(b), the probability value p(g, z) for the grids in the lake is 0, whilst the p(g, z) in the market area are as large as 12.5% which means the user has a chance of 12.5% to be located in that grid. Note that the value of p(g, z) ranges in [0, 1). Theorem 1. the sum of p(g, z) is 1, i.e., p(g, z) = 1 g z Proof. Suppose that CZ z consists of n grids, i.e., z = {g 1, g 2,..., g n}. Based on Definition 2, we have p(g, z) = p(g 1, z) + p(g 2, z) + + p(g n, z) g z = C(g1) C(g ) + C(g2) C(g ) + + C(g1) + C(g2) + + C(gn) = C(g ) = C(g) g z C(g ) = 1 C(gn) C(g ) When a user receives several CZs from his P2P neighbors, these received CZs may overlap with each other. Thus, some grids may be covered by two or more CZs at the same time which will increase the probability that a user may appear in the grid. We refer to this as the total probability value for a grid g, denoted as P (g), which is the sum of probability values contributed by each CZ which covers the gird g. Definition 3. Let Z be a set of CZs, i.e., Z = {z 1, z 2,..., z k }, and let all CZs in Z cover the grid g, i.e., g k i=1z i. The total probability for a user to appear in grid g, denote as P (g), can be calculated as P (g) = k p(g, z i), i=1 where g z i Generally speaking, a CZ with a larger area (containing more grids) is more likely to cover more anonymous users thus to achieve a better k-anonymity protection. However, a large CZ also brings several disadvantages. First, a large CZ always indicates low-accuracy location information which will result in low quality of service (QoS). Second, it may cause more communication overhead between users and MSN servers because of the inaccurate locations. Third, to generate a large CZ, a user may need more time and computing resource. Hence, when generating a CZ, it is wise for a CZ to cover some grids with large P (g) value whilst still remaining acceptable size. Therefore, in order to balance the privacy effect against QoS, we defines the Zone Density of CZ as a trade-off metrics. Definition 4. Given a user s own CZ, denoted as z, and a grid g inside the CZ, i.e.,g z. We measure the quality of z based on the density of anonymous users inside z, denoted as Den(z), which is defined as follows Den(z) = 1 + g z P (g) N(z) where N(z) represents the total number of grids inside z which also indicates the area of z. According to the definition of CZ, N(z) can be calculated by the following formula N(z) = x ul x br y ul y br where (x ul, y ul ) and (x br, y br ) are the coordinates of the upper-left and bottom-right grids of CZ z. In this paper, we consider both the CZ s area and the covering number of anonymities of the CZ. Hence, we utilize Den(z) as a metric to balance the privacy protection (number of anonymities) against QoS effect (CZ s area). The goal of our algorithm, namely MaxDen algorithm, for generating CZ is to find a CZ with maximal possible value of Den(z). 6. IMPLEMENTATION OF SALS This section firstly gives the overview of SALS, and then shows MaxDen algorithm in detail. 6.1 Overview of the Algorithm The basic process for generating a user s CZ can be carried out by three phases. Figure 4 shows an example of the process. From Figure 4(a), we have six mobile users m 1, m 2,..., and m 6 in a GridMap which contains five types of semantic locations. The following steps show how user m 1 generates his CZ. Firstly, via the P2P communication technique, user m 1 will receive other five neighbors shared location information, i.e., five different CZs as shown in Figure 4(b). This phase can be run in several modes, i.e., on-demand, proactive, or dual-active modes [3, 5]. Next, based on these received CZs, user m 1 calculates the P (g) value for each grid around him, as shown in Figure 4(c) 5. The larger value a grid has, the more likely users may appear in that grid. Finally, based on these grid values, we then generate m 1 s own CZ by using MaxDen algorithm. Figure 4(d) gives an example of the generated CZ. The CZ is then shared with other mobile users. 5 The blank grids have values of 0. 53

6 Figure 4: An example to represent the basic process for CZ generating. 6.2 MaxDen Algorithms In this part, we describe MaxDen algorithm for generating CZ in detail. This algorithm can guarantee to generate a CZ with the largest possible Den(z) value under a user s specified area constraints. In practice, each user may have different requirements on the CZ s area which is defined in user s privacy profile. For example, they can control the area of the CZ by defining the parameters S max and S min which are the maximal and minimal acceptable areas of CZ. The main idea of MaxDen algorithm is to enumerate all the possible CZs under the given area limitation so as to select the one with the greatest Den(z). Hence, our algorithm guarantees to output the best result for every scenario. Algorithm 1 shows the pseudo code of MaxDen algorithm. 6.3 Security Analysis of SALS As mentioned in Section 2, an adversary can take either active or passive attack to violate a user s location privacy. Since most of the previous spatial cloaking solutions cannot defend the semantic-location attack, our SALS, however, considers the semantic location affection by assigning each type of semantic locations with different coefficients C(location). By using these coefficients, the distribution of users locations is no longer uniform but follows the real world s semantic location context. By calculating the probability of users appearing in one grid, we can adjust the CZ s shape and position so as to avoid covering those grids that Algorithm 1: MaxDen Algorithm Input: Z: a set of CZs, (S min, S max ) Output: z 1 Define: 2 g ul = upper left grid of z; 3 g br = bottom right grid of z; 4 g u = the grid which covers the user; 5 maxden = record the max Den(z); 6 Calculate P (g) for each grid based on Z; 7 foreach possible zone z in the GridMap do 8 if z does not contain the g u then 9 continue; 10 else if N(z ) < S min or N(z ) > S max then 11 continue; 12 calculate the Den(z ); 13 if Den(z ) > maxden then 14 g ul = upper left grid of z ; 15 g br = bottom right grid of z ; 16 maxden = Den(z ); 17 end 18 end 19 return z = (id, systemtime, g ul, g br ); 54

7 The area of CZ Number of users inside the GridMap Figure 5: A part of the map of Hangzhou and its GridMap with semantic location context. The value of Den(z) Number of users inside the GridMap Figure 6: Comparison of Den(z) against user number. are hard to reach. Since all users follow this generating rule, their CZs are apt to cover some crowded semantic locations after several rounds of generating process. Therefore, it is impossible for an attacker to initiate a semantic-location attack on a user s CZ by pruning as many grids as before to narrow down the user s real location range because most of the grids inside the CZ have large and almost similar C(location) values. The key point for a successful social-relation-disclosure attack lies on the social-relation knowledge that an attacker has gathered. Based on these knowledge, an attacker can reveal a victim s real location by relating to his friends locations. In an MSN environment, since these knowledge are public online, an attacker cannot be prevented from gathering a victim s social relationships. However, our SALS can defend this attack to a certain degree even if the attacker has known the location information of the victim s friends. This is because the CZs shared by everyone are blurred so that the attacker can mine few knowledge from the CZs but only some vague information. The center-of-zone attack and border-of-zone attack are effective for those algorithms of which the generated CZs often contain the users at the center or boundary of the CZs. Because the goal of MaxDen algorithm is to achieve the largest possible Den(z) value, it will not directly affect a user s position in the CZ. As aforementioned, SALS is not designed to defend the active attacks, e.g., region-probing attack and location-flooding attack. In the future work, we can introduce some messagefiltering strategies to reject these malicious messages. 7. PERFORMANCE EVALUATION In this section, we evaluate the performance of the Max- Den algorithm from the following three aspects, (1) average Figure 7: number. Comparison of CZ s area against user Table 1: The performance against semantic-location attack Semantic Type Covering probability Area ratio Road 78.2% 11.3% Park 36.6% 14.2% Lake 2.6% 0.4% Shopping Mall 88.4% 45.4% Residence 48.8% 28.7% Den(z) value, (2) average area of CZ, and (3) the defending efficiency against semantic-location attack. For the experimental setup, we choose a part of the map of Hangzhou City in China as the semantic location background, as shown in Figure 5(a). We build up a GridMap in which each grid is a square with an area of m 2. The semantic context of each grid and the semantic location coefficients are shown in Figure 5(b). The number of simulated mobile users inside the GridMap increases from 100 to 500 for different scenarios. The area constraint for each CZ is [64, 400] grids. The testbed is implemented by Java and run on a PC with Intel Core 2 Quad CPU at 2.4GHz and 1.96GB RAM. Figure 6 shows that the value of Den(z) grows steadily with the increase of user number in the given GridMap, i.e., from 100 to 500. This is because the overall user density of the GridMap is increasing, so is the Den(z) value of the CZ. From Figure 7 we can also observe that the size of CZ is growing with the user number. This is because with more users in the GridMap, some small regions in the GridMap will have high user density. Therefore, the CZs whose areas are relatively small are tend to expand their areas to cover these high density regions. As a result, the average size of CZs will increase steadily. For defending the semantic-location attack, the key is to stop attackers from pruning the CZ s area which also means that there should not exist many grids in the CZ whose C(location) values are relatively small. Thus, a well generated CZ is the one in which most of the grids C(location) values are about the same. In this experiment, we run 500 times of simulation, and calculate the average probability of each type of semantic locations being covered by the generated CZ, and the mean ratio of the area of each type of semantic locations versus the CZ area. In Table 1, the results show that 88.4% of the CZs cover at least one grid with the semantic type of Shopping Mall, whereas only 2.6% of the CZs cover the semantic type of Lake. Moreover, the area of girds of Shopping Mall takes up as many as 45.4% of the total area of CZ, however, the Lake only takes up 0.4% of the total area. Therefore, the result verifies that our algorithm can effectively prevent the semantic-location attack. 55

8 8. CONCLUSION In this paper, we have proposed SALS, a semantics-aware location sharing framework based on cloaking zone, for preserving mobile users location privacy in a mobile social network environment. In summary, we have made the following contributions. (1) We have considered the unique characteristic of an MSN environment without assuming any trustworthy entities. As a result, we have enabled users to share CZs rather than their exact locations to any entities. (2) We have taken into account the semantic locations affection when generating a CZ. (3) We have summarized a set of privacy attacks and also evaluated our algorithm against these attacks. The results have shown that our algorithm can well defend the semantic-location attack. In respect to the future work, we plan to conduct our experiments in a real application environment. We also plan to investigate the solutions against active attacks. 9. ACKNOWLEDGMENTS This research is partly supported by the MOE-Intel IT Research Fund of China under Grant No. MOE-INTEL REFERENCES [1] A. Beresford and F. Stajano. Location privacy in pervasive computing. Pervasive Computing, IEEE, 2(1):46 55, [2] W. Chang, J. Wu, and C. C. Tan. Enhancing mobile social network privacy. In Proceedings of the IEEE Global Communications Conference (Globecom), pages 1 5, [3] Y. Che, Q. Yang, and X. Hong. A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), pages , April [4] C. Y. Chow, M. F. Mokbel, and W. G. Aref. Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems (TODS), 34(4):24:1 24:48, [5] C.-Y. Chow, M. F. Mokbel, and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th ACM International Symposium on Geographic Information Systems (ACM-GIS), pages , [6] C.-Y. Chow, M. F. Mokbel, and X. Liu. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2): , April [7] M. Damiani, E. Bertino, and C. Silvestri. The probe framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2): , [8] M. L. Damiani, C. Silvestri, and E. Bertino. Fine-grained cloaking of sensitive positions in location-sharing applications. IEEE Pervasive Computing, 10(4):64 72, [9] M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications and Services (MobiSys), pages 31 42, [10] M. F. Mokbel, C. Y. Chow, and W. G. Aref. The new Casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB), pages , [11] G. Pei, M. Gerla, and X. Hong. LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility. In Proceedings of 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pages 11 18, [12] K. P. N. Puttaswamy and B. Y. Zhao. Preserving privacy in location-based mobile social applications. In Proceedings of the 11th International Workshop on Mobile Computing Systems & Applications (HotMobile), pages 1 6, [13] W. Wei, F. Xu, and Q. Li. MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. In Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM), pages , [14] X. Wu, J. Liu, X. Hong, and E. Bertino. Anonymous geo-forwarding in manets through location cloaking. IEEE Transactions on Parallel and Distributed Systems (TPDS), 19(10): , [15] G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: three protocols for location privacy. In Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET), pages 62 76,

ScienceDirect. A privacy preserving technique to prevent sensitive behavior exposure in semantic location-based service

ScienceDirect. A privacy preserving technique to prevent sensitive behavior exposure in semantic location-based service Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 35 (2014 ) 318 327 18 th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems

More information

Spatial Cloaking algorithm for location privacy preservation.

Spatial Cloaking algorithm for location privacy preservation. International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 619 Spatial Cloaking algorithm for location privacy preservation. Suchita R. Shastry, Dr. A. B. Bagwan, Department

More information

Toward a Distributed k-anonymity Protocol for Location Privacy

Toward a Distributed k-anonymity Protocol for Location Privacy Toward a Distributed k-anonymity Protocol for Location Privacy Ge Zhong and Urs Hengartner Cheriton School of Computer Science University of Waterloo Waterloo ON, N2L 3G1, Canada {gzhong,uhengart}@cs.uwaterloo.ca

More information

A Secure Location-Based Coupon Redeeming System

A Secure Location-Based Coupon Redeeming System A Secure Location-Based Coupon Redeeming System J. Maruthi Nagendra Prasad and A. Subramanyam Abstract With the rapid evolution of mobile computing technologies, Mobile location based services are identified

More information

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in

More information

Privacy Preserving Location Based Messaging Service

Privacy Preserving Location Based Messaging Service Privacy Preserving Location Based Messaging Service 1 Sangeetha U, 2 Sanjay Kamar C K 1 M. Tech Final Year Student, 2 Asst. Professor, 1 Computer Network Engineering, 2 PG Studies In CE & A NIE Mysuru,

More information

Hiding Location Information from Location-Based Services

Hiding Location Information from Location-Based Services Hiding Location from Location-Based Services Urs Hengartner David R. Cheriton School of Computer Science University of Waterloo Waterloo ON, N2L 3G1, Canada uhengart@cs.uwaterloo.ca Abstract In many existing

More information

L2P2: Location-aware Location Privacy Protection for Location-based Services

L2P2: Location-aware Location Privacy Protection for Location-based Services L2P2: Location-aware Location Privacy Protection for Location-based Services Yu Wang Dingbang Xu Xiao He Chao Zhang Fan Li Bin Xu Department of Computer Science, University of North Carolina at Charlotte,

More information

Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints

Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints Location Privacy Protection for Preventing Replay Attack under Road-Network Constraints Lan Sun, Ying-jie Wu, Zhao Luo, Yi-lei Wang College of Mathematics and Computer Science Fuzhou University Fuzhou,

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor(SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2,Issue 6, June -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 THIRD PARTY

More information

NON-CENTRALIZED DISTINCT L-DIVERSITY

NON-CENTRALIZED DISTINCT L-DIVERSITY NON-CENTRALIZED DISTINCT L-DIVERSITY Chi Hong Cheong 1, Dan Wu 2, and Man Hon Wong 3 1,3 Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong {chcheong, mhwong}@cse.cuhk.edu.hk

More information

Design Considerations on Implementing an Indoor Moving Objects Management System

Design Considerations on Implementing an Indoor Moving Objects Management System , pp.60-64 http://dx.doi.org/10.14257/astl.2014.45.12 Design Considerations on Implementing an s Management System Qian Wang, Qianyuan Li, Na Wang, Peiquan Jin School of Computer Science and Technology,

More information

A Unified Framework for Authenticating Privacy Preserving Location Based Services

A Unified Framework for Authenticating Privacy Preserving Location Based Services A Unified Framework for Authenticating Privacy Preserving Location Based Services Tanzima Hashem 1, Shudip Datta 1, Tanzir Ul Islam 1, Mohammed Eunus Ali 1, Lars Kulik 2, and Egemen Tanin 2 1 Dept of CSE,

More information

The New Casper: Query Processing for Location Services without Compromising Privacy

The New Casper: Query Processing for Location Services without Compromising Privacy The New Casper: Query Processing for Location Services without Compromising Privacy Mohamed F.Mokbel 2 Chi-Yin Chow Walid G. Aref D ep art ment of Comp u t er S cien ce an d En gin eerin g, U n iversity

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

Solutions. Location-Based Services (LBS) Problem Statement. PIR Overview. Spatial K-Anonymity

Solutions. Location-Based Services (LBS) Problem Statement. PIR Overview. Spatial K-Anonymity 2 Location-Based Services (LBS) Private Queries in Location-Based Services: Anonymizers are Not Necessary Gabriel Ghinita Panos Kalnis Ali Khoshgozaran 2 Cyrus Shahabi 2 Kian Lee Tan LBS users Mobile devices

More information

Social Networks. Gang Sun 1, 2, Yuxia Xie 1, Dan Liao 1,3, Hongfang Yu 1,2, Victor Chang 4 1. INTRODUCTION

Social Networks. Gang Sun 1, 2, Yuxia Xie 1, Dan Liao 1,3, Hongfang Yu 1,2, Victor Chang 4 1. INTRODUCTION User-Defined Privacy Location-Sharing System in Mobile Online Social Networks Gang Sun 1, 2, Yuxia Xie 1, Dan Liao 1,3, Hongfang Yu 1,2, Victor Chang 4 1 Key Lab of Optical Fiber Sensing and Communications

More information

Location Privacy, Its Significance and Methods to Achieve It

Location Privacy, Its Significance and Methods to Achieve It Cloud Publications International Journal of Advanced Remote Sensing and GIS 2014, Volume 3, Issue 1, pp. 784-789, Article ID Tech-304 ISSN 2320-0243 Review Article Open Access Location Privacy, Its Significance

More information

Location Traceability of Users in Location-based Services

Location Traceability of Users in Location-based Services Location Traceability of Users in Location-based Services Yutaka Yanagisawa Hidetoshi Kido Tetsuji Satoh, NTT Communication Science Laboratories, NTT Corporation Graduate School of Information Science

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services

Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services Computer and Information Science; Vol. 8, No. 4; 2015 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Trusted Base Stations-Based Privacy Preserving Technique in Location-Based

More information

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM

LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM LOCAWARD: A SECURITY AND PRIVACY AWARE LOCATION-BASED REWARDING SYSTEM Madhuri Martis 1, Rameshkumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering, STJIT, Ranebennur,

More information

Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks I. J. Computer Network and Information Security, 2013, 1, 14-23 Published Online January 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2013.01.02 Hybrid Model for Location Privacy in Wireless

More information

A User Proprietary Obfuscate System for Positions Sharing in Location-Aware Social Networks

A User Proprietary Obfuscate System for Positions Sharing in Location-Aware Social Networks Journal of Computer and Communications, 2015, 3, 7-20 Published Online May 2015 in SciRes. http://www.scirp.org/journal/jcc http://dx.doi.org/10.4236/jcc.2015.35002 A User Proprietary Obfuscate System

More information

Research Article Nonexposure Accurate Location K-Anonymity Algorithm in LBS

Research Article Nonexposure Accurate Location K-Anonymity Algorithm in LBS e Scientific World Journal, Article ID 619357, 8 pages http://dx.doi.org/10.1155/2014/619357 Research Article Nonexposure Accurate Location K-Anonymity Algorithm in LBS Jinying Jia and Fengli Zhang School

More information

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University

Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy. Xiaokui Xiao Nanyang Technological University Privacy Preserving Data Publishing: From k-anonymity to Differential Privacy Xiaokui Xiao Nanyang Technological University Outline Privacy preserving data publishing: What and Why Examples of privacy attacks

More information

Coordinate Transformation A Solution for the Privacy Problem of Location Based Services?

Coordinate Transformation A Solution for the Privacy Problem of Location Based Services? Coordinate Transformation A Solution for the Privacy Problem of Location Based Services? Andreas Gutscher Universität Stuttgart Institute of Communication Networks and Computer Engineering (IKR) Stuttgart,

More information

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements.

Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Ad hoc networking using Wi-Fi during natural disasters: overview and improvements. Matthijs Gielen University of Twente P.O.Box 217, 7500AE Enschede The Netherlands m.w.gielen@student.utwente.nl ABSTRACT

More information

Steps Towards Location Privacy

Steps Towards Location Privacy Steps Towards Location Privacy Subhasish Mazumdar New Mexico Institute of Mining & Technology Socorro, NM 87801, USA. DataSys 2018 Subhasish.Mazumdar@nmt.edu DataSys 2018 1 / 53 Census A census is vital

More information

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #17 Location Security and Privacy HW #3 is due today Announcements Exam is in-class on Nov 9 Agenda Location security Location privacy Location, Location,

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #16 Network Privacy & Anonymity 2014 Patrick Tague 1 Network Privacy Issues Network layer interactions in wireless networks often expose

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Contextion: A Framework for Developing Context-Aware Mobile Applications

Contextion: A Framework for Developing Context-Aware Mobile Applications Contextion: A Framework for Developing Context-Aware Mobile Applications Elizabeth Williams, Jeff Gray Department of Computer Science, University of Alabama eawilliams2@crimson.ua.edu, gray@cs.ua.edu Abstract

More information

PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS

PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS Ruchika Gupta, Udai Pratap Rao and Manish Kumar Department of Computer Engineering, S. V. National Institute of Technology, Surat,

More information

Privacy Based Protection Mechanism for Location Data with an Accurate Service

Privacy Based Protection Mechanism for Location Data with an Accurate Service Privacy Based Protection Mechanism for Location Data with an Accurate Service K. Spatika #1 # Vellore Institute of Technology, India Abstract Location based service are suitable for the user based services.

More information

Query-Aware Location Anonymization for Road Networks

Query-Aware Location Anonymization for Road Networks Noname manuscript No. (will be inserted by the editor) Query-Aware Location Anonymization for Road Networks Chi-Yin Chow Mohamed F. Mokbel Jie Bao Xuan Liu Received: date / Accepted: date Abstract Recently,

More information

Privacy preservation in the dissemination of location data

Privacy preservation in the dissemination of location data Privacy preservation in the dissemination of location data Manolis Terrovitis Institute for the Management of Information Systems (IMIS) Research Center thena thens, Greece mter@imis.athena-innovation.gr

More information

Towards Achieving Personalized Privacy for Location-Based Services

Towards Achieving Personalized Privacy for Location-Based Services 77 99 Towards Achieving Personalized Privacy for Location-Based Services Nayot Poolsappasit, Indrakshi Ray Computer Science Department, Colorado State University, Fort Collins, Colorado 80523, USA. Email:

More information

Spoofing Detection in Wireless Networks

Spoofing Detection in Wireless Networks RESEARCH ARTICLE OPEN ACCESS Spoofing Detection in Wireless Networks S.Manikandan 1,C.Murugesh 2 1 PG Scholar, Department of CSE, National College of Engineering, India.mkmanikndn86@gmail.com 2 Associate

More information

Exploring historical location data for anonymity preservation in location-based services

Exploring historical location data for anonymity preservation in location-based services Retrospective Theses and Dissertations 2007 Exploring historical location data for anonymity preservation in location-based services Ge Toby Xu Iowa State University Follow this and additional works at:

More information

Threats & Vulnerabilities in Online Social Networks

Threats & Vulnerabilities in Online Social Networks Threats & Vulnerabilities in Online Social Networks Lei Jin LERSAIS Lab @ School of Information Sciences University of Pittsburgh 03-26-2015 201 Topics Focus is the new vulnerabilities that exist in online

More information

Location Privacy Protection in Contention Based Forwarding for VANETs

Location Privacy Protection in Contention Based Forwarding for VANETs Location Privacy Protection in Contention Based Forwarding for VANETs Qing Yang Alvin Lim Xiaojun Ruan and Xiao Qin Computer Science and Software Engineering Auburn University, Auburn, AL, USA 36849 Email:

More information

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,

More information

Privacy Preservation in Location Based Services

Privacy Preservation in Location Based Services Privacy Preservation in Location Based Services Sahana Shivaprasad, Huian Li, Xukai Zou* Department of Computer and Information Science Purdue University Indianapolis, Indiana 46202, USA. * Corresponding

More information

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,

More information

An Attempt to Identify Weakest and Strongest Queries

An Attempt to Identify Weakest and Strongest Queries An Attempt to Identify Weakest and Strongest Queries K. L. Kwok Queens College, City University of NY 65-30 Kissena Boulevard Flushing, NY 11367, USA kwok@ir.cs.qc.edu ABSTRACT We explore some term statistics

More information

A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services

A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services Chi-Yin Chow Department of Computer Science and Engineering University of Minnesota Minneapolis, MN cchow@cs.umn.edu Mohamed

More information

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud

More information

Protecting Sink Location Against Global Traffic Monitoring Attacker

Protecting Sink Location Against Global Traffic Monitoring Attacker 016 International Conference on Computing, Networking and Communications, Wireless Ad Hoc and Sensor Networks Protecting Sink Location Against Global Traffic Monitoring Attacker Juan Chen Dept. of Information

More information

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments A Privacy-Aware Service Protocol for Ubiquitous Computing Environments Gunhee Lee, Song-hwa Chae, Inwhan Hwang, and Manpyo Hong Graduate School of Information Communication, Ajou University, Suwon, Korea

More information

Achieving k-anonymity in Privacy-Aware Location-Based Services

Achieving k-anonymity in Privacy-Aware Location-Based Services Achieving k-anonymity in Privacy-Aware Location-Based Services Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao and Hui Li National Key Laboratory of Integrated Networks Services, Xidian University, China

More information

Evaluation of Privacy Preserving Algorithms Using Traffic Knowledge Based Adversary Models

Evaluation of Privacy Preserving Algorithms Using Traffic Knowledge Based Adversary Models Evaluation of Privacy Preserving Algorithms Using Traffic Knowledge Based Adversary Models Zhanbo Sun, Bin Zan*, Jeff (Xuegang) Ban, Marco Gruteser* and Peng Hao Rensselaer Polytechnic Institute 110 8th

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

A Review on Privacy Preserving Data Mining Approaches

A Review on Privacy Preserving Data Mining Approaches A Review on Privacy Preserving Data Mining Approaches Anu Thomas Asst.Prof. Computer Science & Engineering Department DJMIT,Mogar,Anand Gujarat Technological University Anu.thomas@djmit.ac.in Jimesh Rana

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications

Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications Putting People in their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong Human Computer

More information

Information Flow Control and Privacy. Dennis Chen Ming Chow

Information Flow Control and Privacy. Dennis Chen Ming Chow Information Flow Control and Privacy Dennis Chen Dennis.Chen@tufts.edu Ming Chow Abstract With the rise of technology and the worry of protecting private user information, a new security practice must

More information

Separation Shielding and Content Supporting Locus Positioned Problems

Separation Shielding and Content Supporting Locus Positioned Problems Separation Shielding and Content Supporting Locus Positioned Problems Urlam Sridhar Assistant Professor, Department of CSE, Sri Venkateswara College of Engineering and Technology. ABSTRACT: In this paper

More information

Leveraging Transitive Relations for Crowdsourced Joins*

Leveraging Transitive Relations for Crowdsourced Joins* Leveraging Transitive Relations for Crowdsourced Joins* Jiannan Wang #, Guoliang Li #, Tim Kraska, Michael J. Franklin, Jianhua Feng # # Department of Computer Science, Tsinghua University, Brown University,

More information

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy Purdue University Purdue e-pubs Cyber Center Publications Cyber Center 2009 Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy Gabriel Ghinita Follow this and additional

More information

Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol

Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol Designing Anonymity Server based on K Optimal Principle for Privacy Preserving Protocol Mr. Y. S. Amle, Prof. Dr. S. S. Lomate, Prof. R. A. Auti Abstract There is need to secure mobile phones locations

More information

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li

DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Welcome to DS504/CS586: Big Data Analytics Data Management Prof. Yanhua Li Time: 6:00pm 8:50pm R Location: KH 116 Fall 2017 First Grading for Reading Assignment Weka v 6 weeks v https://weka.waikato.ac.nz/dataminingwithweka/preview

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data

A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data A Novel Method for Activity Place Sensing Based on Behavior Pattern Mining Using Crowdsourcing Trajectory Data Wei Yang 1, Tinghua Ai 1, Wei Lu 1, Tong Zhang 2 1 School of Resource and Environment Sciences,

More information

Privacy in Sensor Nets

Privacy in Sensor Nets Privacy in Sensor Nets Wade Trappe Yanyong Zhang Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Brief Update on the Security Group and then PARIS Motivation Set the

More information

TAPAS: Trustworthy privacy-aware participatory sensing

TAPAS: Trustworthy privacy-aware participatory sensing Knowl Inf Syst DOI 10.1007/s10115-012-0573-y REGULAR PAPER TAPAS: Trustworthy privacy-aware participatory sensing Leyla Kazemi Cyrus Shahabi Received: 24 January 2012 / Revised: 1 September 2012 / Accepted:

More information

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN D.Gayathri 1, Abdul Vahed 2 1 Student,M.Tech (CSE), 2 Assistant Professor,CSE Department, Sri Sunflower college of Engineering

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

Securing Mobile System Locations by Anonymous Server Design Based on K Optimal Principle

Securing Mobile System Locations by Anonymous Server Design Based on K Optimal Principle Securing Mobile System Locations by Anonymous Server Design Based on K Optimal Principle Mr. Dattatray S. Shingate (ME-II, Computer) Prof.S.A.Bhavsar (ME, Computer) (Guide) Department of Computer Engineering

More information

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique

A Real Time GIS Approximation Approach for Multiphase Spatial Query Processing Using Hierarchical-Partitioned-Indexing Technique International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 A Real Time GIS Approximation Approach for Multiphase

More information

A Theoretical Model for Location Privacy in Wireless Personal Area Networks

A Theoretical Model for Location Privacy in Wireless Personal Area Networks A Theoretical Model for Location Privacy in Wireless Personal Area Networks Dave Singelée 1, Ford-Long Wong 2, Bart Preneel 1, and Frank Stajano 2 1 ESAT SCD COSIC, Katholieke Universiteit Leuven IBBT,

More information

A Privacy Preserving Web Recommender System

A Privacy Preserving Web Recommender System A Privacy Preserving Web Recommender System Ranieri Baraglia Massimo Serrano Claudio Lucchese Universita Ca Foscari Venezia, Italy Salvatore Orlando Universita Ca Foscari Venezia, Italy Fabrizio Silvestri

More information

Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach

Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach Cloaking Locations for Anonymous Location Based Services: A Hybrid Approach Chengyang Zhang and Yan Huang Computer Science and Engineering Department University of North Texas Abstract. An important privacy

More information

A Reliable B-Tree Implementation over Flash Memory

A Reliable B-Tree Implementation over Flash Memory A Reliable B-Tree Implementation over Flash Xiaoyan Xiang, Lihua Yue, Zhanzhan Liu, Peng Wei Department of Computer Science and Technology University of Science and Technology of China, Hefei, P.R.China

More information

Privacy Protected Spatial Query Processing

Privacy Protected Spatial Query Processing Privacy Protected Spatial Query Processing Slide 1 Topics Introduction Cloaking-based Solution Transformation-based Solution Private Information Retrieval-based Solution Slide 2 1 Motivation The proliferation

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department

More information

A SURVEY ON SEARCHING SPATIO-TEXTUAL TOP K-QUERIES BY REVERSE KEYWORD

A SURVEY ON SEARCHING SPATIO-TEXTUAL TOP K-QUERIES BY REVERSE KEYWORD Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps

Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps Xiaoen Ju and Kang G. Shin Department of Electrical Engineering and Computer Science University of Michigan jux,kgshin@eecs.umich.edu

More information

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks

Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks 1 Supplementary file for SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks Wei Wei, Fengyuan Xu, Chiu C. Tan, Qun Li The College of William and Mary, Temple University {wwei,

More information

Cooperative Private Searching in Clouds

Cooperative Private Searching in Clouds Cooperative Private Searching in Clouds Jie Wu Department of Computer and Information Sciences Temple University Road Map Cloud Computing Basics Cloud Computing Security Privacy vs. Performance Proposed

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

Secure Message Delivery Games for Device-to-Device Communications

Secure Message Delivery Games for Device-to-Device Communications Secure Message Delivery Games for Device-to-Device Communications GameSec 2014 Manos Panaousis November 6, 2014 Manos Panaousis (University of Brighton) GameSec 14 November 6, 2014 1 / 20 Future smartphones

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

arxiv: v2 [cs.db] 6 Nov 2010

arxiv: v2 [cs.db] 6 Nov 2010 Noname manuscript No. (will be inserted by the editor) Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies Sergio Mascetti Dario Freni Claudio Bettini

More information

VPriv: Protecting Privacy in Location- Based Vehicular Services

VPriv: Protecting Privacy in Location- Based Vehicular Services VPriv: Protecting Privacy in Location- Based Vehicular Services Raluca Ada Popa and Hari Balakrishnan Computer Science and Artificial Intelligence Laboratory, M.I.T. Andrew Blumberg Department of Mathematics

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Recommendation System for Location-based Social Network CS224W Project Report

Recommendation System for Location-based Social Network CS224W Project Report Recommendation System for Location-based Social Network CS224W Project Report Group 42, Yiying Cheng, Yangru Fang, Yongqing Yuan 1 Introduction With the rapid development of mobile devices and wireless

More information

Authenticating Pervasive Devices with Human Protocols

Authenticating Pervasive Devices with Human Protocols Authenticating Pervasive Devices with Human Protocols Presented by Xiaokun Mu Paper Authors: Ari Juels RSA Laboratories Stephen A. Weis Massachusetts Institute of Technology Authentication Problems It

More information

A Privacy-enhancing Model for Location-based Personalized Recommendations

A Privacy-enhancing Model for Location-based Personalized Recommendations Distributed and Parallel Databases manuscript No. (will be inserted by the editor) A Privacy-enhancing Model for Location-based Personalized Recommendations Jin Huang Jianzhong Qi Yabo Xu Jian Chen Received:

More information

Interactive Campaign Planning for Marketing Analysts

Interactive Campaign Planning for Marketing Analysts Interactive Campaign Planning for Marketing Analysts Fan Du University of Maryland College Park, MD, USA fan@cs.umd.edu Sana Malik Adobe Research San Jose, CA, USA sana.malik@adobe.com Eunyee Koh Adobe

More information